2 Data Flows and Communication
• Hardware and software requirements
• Architecture • Data flows
3 Searching Data
• Creating searches
• Search operators
• Analyzing processes
• Analyzing binaries
• Advanced queries
4 Managing Watchlists
• Subscribing
• Alerting
• Custom watchlists
5 Alert Processing
• Alert creation
• Analyzing alert data
• Alert actions
6 Threat Hunting in Enterprise EDR
• Cognitive Attack Loop
• Malicious behaviors
7 Response Capabilities
• Using quarantine
• Using live response